Dictionary · SEC IM Guidance Update: Cybersecurity Guidance, No. 2015-02
L2 — definitions grouped by regulatory framework.
Verbs
11 senses- assist
To give support or aid to someone, typically by doing a share of the work; help.
- control
To exercise authority over; direct; regulate. This include exercising authority over the processesses of issuance and revocation, management, and auditing.
- reduce
To make smaller or less in amount, degree , or size.
- create
To bring something or cause to come into existence; originate; make; design.
- protect
To shield or defend from danger, harm, injury, loss, destruction, or damage.
- identify
To establish, indicate, or verify who or what someone or something is.
- implement
To put a plan, policy, decision, agreement, etc. into action or effect.
- educate
To give or provide with information or intellectual, social, or moral instruction; inform.
- mitigate
To lessen or to try to lessen the severity, pain, seriousness, extent, or gravity of.
- comply
To act in accordance with a wish, command, law, standard, or contractual obligation.
- conduct
To manage, control, or organize and carry out.
Nouns
43 senses- Cyber Attack
A cyberspace attack targeting an enterprises use of cyberspace to disrupt, disable, destroy, or maliciously control a computing environment or infrastructure; or destroy the integrity of the data or steal controlled information.
- access
The ability, right, or permission to approach, enter, speak with someone, or use something.
- location
A particular point or position in space.
- loss
The fact or process of being deprived of or ceasing to have or retain something.
- nature
The basic or inherent qualities, characteristics, or features of something.
- periodic assessment
An assessment that is conducted on a regular interval.
- scope
The extent or boundary to which a process, configuration item, application, contract, etc. applies.
- security control
A safeguard or countermeasure to avoid, counteract or minimize security risks relating to personal property, or any company property. For business-to-business facing organizations whose service may affect the financial statements of the other company, the prospect may require successful audit reports of policy controls.
- security process
A series of actions that ensure the protection of data.
- sensitive data
Information whose loss, misuse, unauthorized access to, modification, or destruction, could adversely affect the national interest or the conduct of federal programs, or privacy to which individuals are entitled, but which has not been specifically authorized to be kept secret in the interest of national defense or foreign policy, etc.
- Sensitivity
A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection.
- system
An interconnected set of information resources under the same direct management control which shares common functionality. A system normally includes hardware, software, information, data, applications, communications, and people.
- tailor
Make or adapt for a particular purpose or person.
- business
A usually commercial or mercantile activity engaged in as a means of livelihood.
- Client
A person or organization using the services of a company or professional person, such as a lawyer, psychologist, financial advisor, etc.
- compliance policy
An official expression of principles that direct an organization's approach to compliance.
- compliance procedure
A detailed description of the steps necessary to implement or perform something in conformance with applicable standards.
- compliance program
Compliance programs aim to prevent, and where necessary, identify and respond to, breaches of laws, regulations, codes or organizational standards occurring in the organization; and promote a culture of compliance within the organization.
- compliance requirement
The various legal, contractual, and service level requirements that an organization must follow.
- compliance risk
The risk to current and prospective earnings that arises from violating or not acting in accordance with laws, rules, regulations, prescribed practices, or ethical standards.
- Compromise
To bring into danger, suspicion, or disrepute.
- cyber threat
A potential cyber attack, which may be assigned a probability of occurrence that can be used for cyber risk assessment.
- cyber incident response procedure
A documented series of steps that are taken to detect, triage, and resolve events regarding cybersecurity that disrupt operations and alert applicable personnel and clients in conformance with pertinent standards.
- cybersecurity policy
A set of criteria for the provision of security services.
- cybersecurity vulnerability
A flaw in a organization's system which leaves it exposed to and defenseless against a cyberthreat.
- cyber threat response strategy
A plan of action designed to achieve a long-term or overall aim regarding how to resolve cyber incidents.
- cybersecurity risk management
The process of identifying risks and vulnerabilities and applying administrative actions and comprehensive solutions to ensure that the organization is adequately protected.
- cybersecurity training
Activities that are used to teach people about tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
- data
A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)
- data backup
The physical copying of data files to a removable storage device that allows the data to be stored in another location.
- data encryption
The reversible transformation of data from the original, plain text, version to a difficult-to-interpret format for security purposes.
- development
The process of growing, advancing, or elaborate.
- effectiveness
The capacity to accomplish a purpose or function as intended.
- exfiltration
The unauthorized file transfer or other bulk data transfer that creates a security breach by allowing malicious people outside a security perimeter access to confidential information.
- exposure
The potential loss or compromise to an area caused by an adverse event.
- federal securities law
Consists of a handful of laws passed between 1933 and 1940, as well as legislation enacted in 1970. The federal laws stem from Congress's power to regulate interstate commerce. Therefore the laws are generally limited to transactions involving transportation or communication using interstate commerce or the mail.
- governance structure
Specifies the distribution of rights and responsibilities among different participants in the corporation, such as the board, managers, shareholders and other stakeholders, and spells out the rules and procedures for making decisions on corporate affairs.
- Impact
In Information Security: the magnitude of harm that can be expected to result from unauthorized disclosure, modification, or destruction of information, loss of information or loss of information system availability.
- include
Make part of a whole or set.
- Incident response plan
The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber attacks against an organization's IT systems(s).
- information
Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.
- Information Technology system
Information technology systems are collectively the equipment used to create, store and transmit digital data and any related software owned (or otherwise controlled) and used by the State and its agencies to fulfill its service and obligations to the citizens of Arizona.
- investor
A person who commits capital in order to gain financial returns.